Quick viewing(Text Mode)

Bandwidth Modeling and Estimation in Peer to Peer Networks

Bandwidth Modeling and Estimation in Peer to Peer Networks

International Journal of Computer Networks & Communications (IJCNC), Vol.2, No.3, May 2010

Bandwidth Modeling and Estimation in Peer to Peer Networks

Kiarash Mizanian, Mehdi Vasef * and Morteza Analoui

School of Computer Engineering

Iran University of Science and Technology, Tehran, IRAN

*Student Member, IEEE

[email protected]

Abstract -Recent studies have shown that the majority of today’s traffic is related to Peer to Peer (P2P) traffic. The study of in P2P networks is very important. Because it helps us in more efficient capacity planning and QoS provisioning when we would like to design a large scale computer networks. In this paper motivated by the behavior of peers (sources or seeds) that is modeled by Ornstein Uhlenbeck (OU) process, we propose a model for bandwidth in P2P networks. This model is represented with a stochastic integral. We also model the bandwidth when we have multiple downloads or uploads. The autocovariance structure of bandwidth in either case is studied and the statistical parameters such as mean, variance and autocovariance are obtained. We then study the queue length behavior of the bandwidth model. The methods for generating synthetic bandwidth process and estimation of the bandwidth parameters using maximum likehood estimation are presented .

Key Words : Bandwidth Modeling, Peer to Peer networks, Ito calculus, Long Range Dependence, OU process, Maximum Likehood Estimation

1. Introduction

The term “peer-to-peer” refers to a class of systems and applications that employ distributed resources to perform a function in a decentralized manner. Benefits of peer to peer systems are cost sharing/reduction, resource aggregation, increased autonomy, anonymity/privacy of the users and finally enabling ad hoc communication and collaboration [1].

Napster [2] was the first popular peer to peer service. This service has allowed hundreds of thousands of users to efficiently share MP3 formatted files. The success of Napster was a big motivation and several other peer to peer file sharing systems were introduced. These include KaZaA [3], Gnutella [4], and eDonkey [5] and [6].

According to Cache Logic [7] by the end of 2004, BitTorrent accounted for as much as 30% of all Internet traffic. Peer to peer represented 60% of Internet traffic at the end of 2004. Most dominant P2P

* Mehdi Vasef is currently a graduate student at University of Duisburg-Essen, Duisburg, Germany

10.5121/ijcnc.2010.2306 65 International Journal of Computer Networks & Communications (IJCNC), Vol.2, No.3, May 2010 systems are BitTorrent, eDonkey and Gnutella. The number of people that use peer to peer file sharing is growing. In January 2005, 2,975,477 online eDonkeyy2k users were reported. In January 2006, the number was increased to 3,351,754 [8].

The number of P2P users , the average file size transported in P2P file sharing systems and percentage of overall network traffic include P2P network traffic are growing, so bandwidth management plays an inevitable role in designing efficient computer networks nowadays. We still do not have accurate models for P2P bandwidth. In this paper, we propose a novel model for modeling P2P bandwidth. To achieve this goal, we should consider both the customers and the share of these customers. The customers are peers and the shares are their traffics in a given network. The second part was accomplished in the authors’ previous work. So our starting points deeming the behavior of peers and pondering it. We use OU type process to describe the peer behavior. We then proceed to model the P2P bandwidth. We use the stochastic calculus approach in our proposed model. Some statistical parameters of the bandwidth model are derived. We also present a model for the total bandwidth .It is shown that the total bandwidth asymptotically has a LRD property. We also derive the length of the buffer fed by the bandwidth. A method for generating synthetic bandwidth is presented. Estimation of bandwidth parameters is another contribution of this paper.

More accurately the contributions of this paper are:

• Modeling the P2P bandwidth and obtaining some parameters such as mean and variance • Modeling total P2P bandwidth and obtaining some parameters such as mean and variance • Study of autocovariance in bandwidth model both in individual and total case and Showing that the total bandwidth is asymptotically a Long Range Dependent process • Obtaining Length of queue fed by a bandwidth process • Synthetic generation of bandwidth process • Estimating bandwidth model parameters using MLE method

The rest of paper is organized as follows. In section 2, we review related works. In section 3, we introduce the mathematics required to understand the model. In section 4, we explain our proposed model. Queuing analysis of the proposed model, synthetic bandwidth generation and the estimation of bandwidth parameters are also studied in section 4. Finally section 5 concludes the paper.

2. Related Works

To best of our knowledge the mathematical model for P2P bandwidth is an unexplored area in the literature. The next paragraphs illustrate the related works that have been done in P2P traffic modeling, modeling the behavior of peers and their impact on the P2P system properties.

[9] proposes a stochastic differential equation approach for modeling the behavior of Peers. The steady state behavior of the peers is investigated. But the bandwidth model is not studied. [10] Proposes a fluid model that characterizes the number of peers in BitTorrent like networks. The arrival and departure processes for sinks and sources are Poisson processes. Another assumption is that all the peers have the same uploading/sinking bandwidth. [11] Proposes a fluid model for BitTorrent system but in comparison to [10], the peer arrival rate is exponential. Their finding is that the existing BitTorrent system provides

66 International Journal of Computer Networks & Communications (IJCNC), Vol.2, No.3, May 2010 poor service availability, fluctuating sinking performance, and unfair services to peers. Their model has revealed that these problems are due to the exponentially decreasing peer arrival rate. A stochastic fluid model [12] is proposed to study performance of peer to peer web cache (SQIRREL) and cache cluster by extending [10]. The [13, 14] use Markovian model to describe P2P file sharing system .But they don’t work well in some P2P system such as BitTorrent. In addition the steady state behavior of peers is not studied.

Recently [15] have proposed a model for P2P traffic. The model is based on Alternating Fractal Renewal Process (AFRP) such that the ON/OFF periods are kind of power law distribution. The sink/source rates are considered constant. The proposed model can capture long range dependent as well as heavy tailedness property.

3. Mathematic Preliminaries

3.1. Long Range Dependence The self similar nature of network traffic was discovered by Will Leland [16]. Mark Crovella Showed that World Wide Web exposed self similar property [17]. Afterwards plenty of papers have been published on the impact of LRD on traffic modeling and queuing performance in computer networks. Here we present some mathematical definitions of LRD based on auto-covariance function.

Let denotes auto-covariance function in a process with LRD property, that is Then we have [18].The H constant is called self similarity parameter or Hurst parameter.

Suppose we have an aggregated process of at aggregation level m, then we have If , then is has a LRD property [18].

3.2. Ornstein Uhlenbeck Process The Ornstein Uhlenbeck process (or mean reverting process) is a stochastic process defined by the following stochastic differential equation [19, 21]:

(1)

(2)

such that:

67 International Journal of Computer Networks & Communications (IJCNC), Vol.2, No.3, May 2010

is a Wiener process

(3)

are long term mean and variance (4)

The covariance function of OU process is given by: (5)

The OU process can be simulated (generated synthetically) by the following formula:

(6)

N

3.3. Stochastic Calculus In stochastic calculus the methods of calculus such as integration and differentiation is extended to stochastic processes such as Wiener process. There are two approaches: Ito calculus and Stratonovich calculus. We use Ito calculus in this paper [20]:

(7)

It can be defined in a way like Rieman-Stieltjes integral:

(8)

The limit can be shown that converges in probability. The proof is out of the scope of this paper. The interested reader is referred to [20] for more information.

68 International Journal of Computer Networks & Communications (IJCNC), Vol.2, No.3, May 2010

4. Bandwidth Modeling in P2P networks

4.1 Bandwidth Model for P2P Networks

Results of studies demonstrate that the evolution of peers is very similar to the OU process [10]. They tend to approach to a definitive value in steady state. They are very similar to stock returns that are modeled with OU process. This leads us to choose the OU process as a model for evolution of peers. We consider some assumptions in proposing the model for P2P bandwidth modeling. These assumptions can be summarized as follows:

• The evolution of peers is modeled with OU process • The peers download or upload rate is constant • We use the P2P traffic model for an individual peer level proposed in our previous work [15] • The behavior of peers is independent of their individual traffic

First we model the bandwidth for individual peer. We have the following definition for individual bandwidth in P2P networks.

Definition1 : Assume we would like to perform a single operation on a peer in predefined set of peers. This operation may be downloading or uploading some file by a peer. The bandwidth in this peer’s link and the involved peers is called individual bandwidth. We represent individual bandwidth with .

In order to model bandwidth we need two elements. The customers (or peers) and the share of them (the corresponding P2P traffic). With reference to previous section, we mentioned that OU process was used for modeling behavior of peers. The only item remains is the share of these peers (P2P traffic). In [15] we propose a model for P2P traffic in the case the traffic is heavy tail and possesses a LRD property. We suppose that we deal with such traffic. So regarding these elements, we propose the P2P bandwidth that is defined as a stochastic integration of traffic with respect to OU process:

(9)

(10)

(11)

In the general case the summation changes into integral: (12) (12)

(13)

is defined in infinitesimal ranges. is the share of every peer or simply the P2P traffic.

Let’s scrutinize the definition. Before delving into the formula, we rewrite the inner parentheses of :

69 International Journal of Computer Networks & Communications (IJCNC), Vol.2, No.3, May 2010

= (14)

So (15)

(16)

Using definition of OU process and substituting with , we have:

(17)

(18)

We suppose that the OU process is zero mean. So the first term of Eq.18 is omitted.

(19)

Comparing the first integral with the convolution of two functions that is represented by:

(20)

We have:

(21)

(22)

(23)

Note that since function range is positive, we consider absolute values or mathematically: (24)

Finally referring to section 3, the second integral can be computed like Reiman-Stieltjes integral:

(25)

It can be easily proved that the limit converges in probability and the interested reader is referred to [20] in stochastic integrals. Considering Eq.25, is a parsimonious model. Only some parameters are needed to describe .Now we derive some statistical properties of the bandwidth process such as mean, variance and autocovariance function.

70 International Journal of Computer Networks & Communications (IJCNC), Vol.2, No.3, May 2010

Lemma1 : The mean and variance of bandwidth process are represented by:

(26)

(27)

Lemma2 : The autocovariance of bandwidth process is represented by

4− min()n0 , n 1  2+ε − 1  2  ACV() Bw Ck1 and the bandwidth process has LRD property.

4.2 Superposition of Bandwidth Processes

Having modeled individual bandwidth in P2P networks, we would like to study aggregated bandwidth in P2P networks. The aggregated bandwidth process is defined below:

Definition 2 : Assume we would like to perform multiple operations on a peer in predefined set of peers. These operations may be downloading or uploading multiple files by a peer. The bandwidth in this peer’s link and the involved peers in these operations is called aggregated bandwidth. We represent the aggregated bandwidth with .

In this section we model aggregated bandwidth and derive some properties such as mean, variance and autocovariance function. According to Definition2, we have: (28)

The following lemma demonstrates how one can obtain the mean, variance of the aggregated bandwidth process.

Lemma3 : The mean and variance of aggregated bandwidth process are represented by:

(29)

(30)

Recall from section 3 that: (31)

71 International Journal of Computer Networks & Communications (IJCNC), Vol.2, No.3, May 2010

4− min()n0 , n 1  ∞ 2+ε − 1  2  ACVt() Bw ∑ Ck1 i (32) i=1

Since the individual bandwidth processes have LRD property, this sum is asymptotically infinite. So the auto-covariance function of aggregated bandwidth process is asymptotically infinite.

The following lemma explains the queuing behavior of bandwidth process.

Lemma4 : The queue length of bandwidth process is given by:

 ()4− min()n0 , n 1 + 2 ε        min()n0 , n 1   ()1−m  − 1 − ε        −1 2   ()min()n0 , n 1 − 2 − 2 ε P() V() t x exp −   x f  2 4− minn , n    min()n , n  ()0 1   2mλ Var B++ Var B σ K ' 0 1 −− 1 ε  +ε    ()()()() 2      2      (33)

4.3 Bandwidth Modeling in Multi-service P2P Networks

Suppose we have a multiservice P2P network- the P2P network with audio, video, image and etc. In this case we define vector valued process for bandwidth modeling in multiservice P2P networks.

(34)

such that elements of this vector is defined as Eq.12.

(35)

(36)

The results of previous lemmas for mean, variance and auto-covariance of individual and aggregated bandwidth process are still valid for the study of bandwidth in multiservice P2P networks.

72 International Journal of Computer Networks & Communications (IJCNC), Vol.2, No.3, May 2010

4.4 Synthetic Bandwidth Generation

In this section we provide a method for synthetic generating bandwidth process. It has some applications; for example when we would like to evaluate the proposed model, we use the results of this section to generate the bandwidth process synthetically in order to compare with measured bandwidth. Recall from section 4.2 that the bandwidth process is represented by the stochastic integration. We consider the summation formula instead of integration, because it can be easily implemented by mathematical softwares.

Lemma5 : The synthetic bandwidth process is generated by:

a  σ  BwBt=τ −∆=' See0−−λλtti+1 −+ i 1 −−− e −2 λ ti+ 1 1 eN − 2 λ t i 0,1 ∑ () s  ()() ( ) () 1−Yi+1  2 λ 

(37) For the aggregated case the summation of individual processes yields the aggregated bandwidth process.

4.5 Estimation of the proposed Model Parameters

The method of Maximum Likehood Estimation (MLE) estimates parameters by finding the values that maximize likehood function. We would like to estimate three parameters . The first parameter corresponds to index of the power law distribution, while the last two parameters correspond to OU process parameters. The lemma 6 proposes how one can estimate these parameters. We suppose that the OU process is zero mean. Lemma6 : The parameters of the bandwidth process are estimated as:

(38)

n n 2 2 2x0 () 1− exp() −∆+ 2λk 2∑ x k − 2exp () −∆ λ kk ∑ x −1 ∧ 1 σ = k=1 k = 1 (39) ()n +1 1 −−∆ exp() 2 λ k

(40)

73 International Journal of Computer Networks & Communications (IJCNC), Vol.2, No.3, May 2010

5. Conclusion

We don't have accurate models for P2P bandwidth. In this paper we proposed a new model for P2P bandwidth that is based on OU process. The model was specified mathematically. We also studied the total bandwidth modeling. Some statistical parameters in both the individual and total bandwidth models were derived. We then provided the queuing analysis for the buffer fed by the bandwidth process. The synthetic generations of the model and bandwidth estimation were also investigated in this paper. Possible applications of the proposed model are bandwidth management and capacity planning in P2P networks. Some of the tasks that are scheduled for the future are:

1. It is of interest to evaluate the model with various measured P2P bandwidths 2. How to minimize file download time in P2P networks is another important issue

Appendix A

Proof of lemma1

(41)

(42)

(43)

(44)

(45)

(46)

E (47)

(48)

(49)

74 International Journal of Computer Networks & Communications (IJCNC), Vol.2, No.3, May 2010

(50)

(51)

(52)

Since B and S are independent, we have:

(53)

Appendix B

Proof of lemma 2

(54)

(55)

(56)

(57)

(58)

(59)

(60)

2 2()H − 1 a −λk  ' ACV() Bw=γ ak + e  + σ K (61) 2λ 

, , (62)

75 International Journal of Computer Networks & Communications (IJCNC), Vol.2, No.3, May 2010

2(H − 1 ) −λk ACVBw( ) = Ck1 + Ce 2 + C 3 (63)

4− min(n , n ) According to [15] the Hurst parameter is given by H = 0 1 (64) 2

4− min()n0 , n 1  2− 1  2  −λk so we have : ACVBw()  Ck1+ Ce 2 + C 3 (65)

We can approximate Eq.65 with:

4− min()n0 , n 1  2+ε − 1  2  ACV() Bw Ck1 (66)

The auto-covariance of the bandwidth process indicates that the is LRD.

Appendix C

Proof of lemma3

The mean of aggregated bandwidth process is defined as:

(67)

(68)

The variance of aggregated bandwidth process is defined as:

(69)

(70)

Appendix D

Proof of lemma 4

Suppose we have a queue that is fed by Bw with service rate C, the length of queue is V. We have:

(71)

76 International Journal of Computer Networks & Communications (IJCNC), Vol.2, No.3, May 2010

From [22] we have:

2H   −1 ()()1−m 1 − H  2 1 −H P() V() t x exp −     x () (72) f  2 H  2ma() 1 − H    

According to lemma1 we have:

4− min(n , n ) H =0 1 + ε 2

(73)

After substituting these values in Eq.72 we have:

 ()4− min()n0 , n 1 + 2 ε        min()n0 , n 1   ()1−m  − 1 − ε        −1 2   ()min()n0 , n 1 − 2 − 2 ε P() V() t x exp −   x f  2 4− minn , n    min()n , n  ()0 1   2mλ Var B++ Var B σ K ' 0 1 −− 1 ε  +ε    ()()()() 2      2     

(74) Appendix E

Proof of lemma5

(75)

(76)

(77)

Referring to [15], the is generated by:

(78)

77 International Journal of Computer Networks & Communications (IJCNC), Vol.2, No.3, May 2010

is the random variable with uniform distribution in the range (0 1 ] and it can be generated by conventional pseudo-random number generators. Referring to section 3.2, we have:

(79)

So we have:

a  σ  BwBt=−∆=τ' See0−−−−λλλλttttiiii+1 −+−+ µ ee + 1 1 −−− e −2 λ t i + 1 1 eN − 2 λ t i 0,1 ∑() s  ()()() ( ) () 1−Yi+1 2 λ  (80)

Since OU process is zero mean, we have:   ' a −−λλttii+1 σ −2 λ t i+ 1 − 2 λ t i BwBt=∑ τ −∆=s  See()0 −+ 1 −−− e 1 eN () 0,1  () () ( ) 1−Yi+1  2 λ 

(82)

Appendix F

Proof of lemma 6

We have:

Since parameters of the proposed bandwidth model are independent, we can separately use MLE method to estimate the parameters. The Maximum likehood function is defined as:

where (82)

We first use MLE to estimate OU process parameters. Then we estimate index of

Step1: The estimation of OU process:

The likehood function of zero mean OU process is [19]:

78 International Journal of Computer Networks & Communications (IJCNC), Vol.2, No.3, May 2010

n +1x2 1 n n x−exp ( −λ ∆ ) x 2 2 0 k k k −1 K()θ=−ln() n σ −−2 ∑() 1 −−∆− exp() 2 λ k ∑ 2 (83) 2σ 2 k=1 k = 1 σ()1− exp() − 2 λ ∆ k

Where

(84)

(85)

We assume that all are equal and constant. (86)

(87)

(88)

(89)

(90)

(91)

(92)

(93)

We also have: , (94)

(95)

(96)

(97)

79 International Journal of Computer Networks & Communications (IJCNC), Vol.2, No.3, May 2010

, (98)

The solution for A can be easily obtained in mathematical softwares such as Maple by intersection of and .

Since (99)

From the solution of above equation solution since , A must be between 0 and 1, that is:

n 2 n +1 2 xk−exp ( −λ ∆ k) x k −1 −++3 2∑ 3 = 0 (100) σ σ k=1 σ()1− exp() − 2 λ ∆ k

n 2 2 2 xk−exp ( −λ ∆ k) x k −1 −+++()n122σ x 0 ∑ = 0 (101) k=1 ()1− exp() − 2 λ ∆ k

n n 2 2 2 xk exp (−λ ∆ k) x k −1 −+++()n122σ x 0 ∑ − 2 ∑ = 0 (102) k=11exp−() −∆ 2λk k = 1 1exp −() −∆ 2 λ k

n n 2 2 2 exp (−λ ∆ k ) 2 −+++()nx12σ 0 ∑ xk − 2 ∑ x k −1 = 0 (103) 1exp2−−∆()λk k =1 1exp2 −−∆() λ k k = 1

n n 2 2 exp (−λ ∆ k ) 2 2 2x0 +∑ xk − 2 ∑ xnk −1 =+() 1 σ (104) 1exp2−−∆()λk k =1 1exp2 −−∆() λ k k = 1 n n 2 2 2x0 () 1exp2−() −∆+λk 2∑ x k − 2exp () −∆ λ kk ∑ x −1 k=1 k = 1 =()n + 1 σ 2 (105) 1− exp() − 2 λ ∆ k

Recall that (106)

n n 2 2 2 21x0 ()− A + 2∑ xAxk − 2 ∑ k −1 k=1 k = 1 =()n + 1 σ 2 (107) 1− A2

80 International Journal of Computer Networks & Communications (IJCNC), Vol.2, No.3, May 2010

n n 22 2 2 −−22xA0 Ax∑k− 1 + 2 ∑ x k + 2 x 0 k=1 k = 1 =()n + 1 σ 2 (108) 1− A2

n n xAAx22+∑ 2 − ∑ xx − 2 0k− 1 k 0 ()n +1 k=1 k = 1 = σ 2 (109) A2 −1 2

n2 n 2  2 2  ∆=∑xk−1  +4 x 0 ∑ xx k + 0  (110) k=1  k = 1 

n 2 −∑ xk−1 ± ∆ k=1 A = 2 (111) 2x0

n n2 n 2 2 2  2  −+∑xk−1 ∑ x k − 10 +4 xxx  ∑ k + 0  k=1 k = 1  k = 1  If A f 2 (112) 2x0

then has a solution. Only the positive solution is considered. We have:

n n 2x2 1exp2−() −∆+λ 2∑ x − 2exp () −∆ λ ∑ x 2 1 0 ()k k kk −1 k=1 k = 1 = σ 2 (113) ()n +1 1 −−∆ exp() 2 λ k

n n 2 2 2x0 () 1− exp() −∆+ 2λk 2∑ x k − 2exp () −∆ λ kk ∑ x −1 ∧ 1 σ = k=1 k = 1 (114) ()n +1 1 −−∆ exp() 2 λ k

Step 2: The index estimation of power law distribution

81 International Journal of Computer Networks & Communications (IJCNC), Vol.2, No.3, May 2010

 0 xp a f() x =  The distribution we used in [15] for modeling P2P traffic is: k x≥ a (115)  xn

The maximum likehood estimation for distribution like this is represented by [23]:

(116)

and the proof is completed.

REFERENCES

1. D.Milojicic, V Kalogeraki, R. Lukose R, K. Nagaraja, and et al, Peer-to-Peer Computing. HP Labs Technical Reports, Palo Alto, USA, 2002. 2. Napster media sharing system , http://www.napster.com/ , 2006. 3. Kazaa Media Desktop , http://www.kazaa.com/, 2006. 4. Gnutella , www.gnutelliums.com, 2006.

5. eDonkey, www.edonkey2000.com, 2006. 6. BitTorrent protocol, http://www.bittorrent.com/protocol.html, 2006.

7. Cache Logic, http://www.cachelogic.com/research/2005_slide07.php, 2006. 8. Slyck, www.Skyck.com, 2006. 9. B. Fan, D.M Chiu, J.C. Lui Stochastic Differential Approach to Model BitTorrent Like Peer to Peer Systems, IEEE International Conference on Communication (ICC), 2006. 10. D. Qiu and R. Srikant, Modeling and performance analysis of BitTorrent-like peer-to-peer networks, in Proc. ACM SIGCOMM’04, 2004.

11. L. Guo L, S. Chen, Z. Xiao, E. Tan and et al , Measurement, analysis and modeling BitTorrent like file sharing systems, 5th of ACM SIGCOM Internet Measurement Conference (IMC’05), New Orleans, USA, 2005. 12. F. Clevenot F, P. Nain, and K. Ross , Stochastic Fluid Models for Cache Clusters, Performance Evaluation , vol. 59, 1-18, 2005. 13. X. Yang and G. de Veciana, Service capacity of peer to peer networks, IEEE INFOCOM, 2004. 14. G. de Vecianna and X. Yang, Fairness, incentives and performance in peer-to-peer networks, in the Forty-first Annual Allerton Conference on Communication, Control and Computing, 2003. 15. K. Mizaninan, M. Vasef and M. Analoui, The Modified Alternating fractal Renewal Process for Modeling Peer to Peer Traffic, International Journal of Computer Systems Science and Engineering , 24 (6), 409-422, 2009. 16. W. Leland WE, M. Taqqu MS, W. Willinger, and et al, On the self-similar nature of Ethernet traffic (Extended Version), IEEE/ACM Transactions on Networking , 2 (1), 1-15, 1994.

82 International Journal of Computer Networks & Communications (IJCNC), Vol.2, No.3, May 2010

17. M. Crovella, and A. Bestavros, Self-similarity in World Wide Web traffic: Evidence and possible causes, IEEE/ACM Transactions on Networking , 5(6), 835-846, 1997. 18. M. Li, W. Jia and W. Zhao, A Method for Modeling Autocorrelation functions of Asymptotically LRD traffic and its validation, WCC-ICCT, 2000. 19. L. Valdivieso, W. Schoutens,F. Tuerlinckx, Maximum Likehood Estimation in processes of Ornstein-Uhlenbeck type, Statistical Inference for Stochastic Processes , 12(1), 1-19, 2009. 20. J.M Steele, Stochastic Calculus and Financial Applications , Springer Verlag, New York, 2001. 21. O.B. Nielsen, N. Shephard ,Non Guassian OU based Models and some of their uses in Financial economics, Journal of the Royal Statistical Society Series B (Statistical Methodology) , 63 (2), 167-241, 2001. 22. I. Norros, A storage model with self-similar input, Queuing Systems , 16 (3/ 4), 387–396, 1994. 23. A. Clauset, C.R. Shalizi and M. E. Newman, Power law distributions in empirical data, SIAM Review , 51, 661-703, 2009.

83